No Image

Lenovo adds to its ThinkPad and ThinkVision portfolios

2021-06-24 KENNETH 0

Lenovo adds to its ThinkPad and ThinkVision portfolios Lenovo is refreshing its Windows-based ThinkPad and ThinkVision lines with redesigned and re-engineered devices, including the ThinkPad X1 Extreme Gen 4, the ThinkPad L13 Gen 2, L13 Yoga Gen 2, ThinkVision M15 mobile monitor and ThinkVision T24m-20 display. The X1 Extreme Gen 4 is available with the latest NVIDIA RTX mobile graphics, up to 64GB DDR4 memory and dual Solid-State Drive (SSD) support. You can also upgrade it with optional 5G Wireless WAN for high-speed access to cloud data. To make the most of remote work, it has an edge-to-edge 16-inch display (with options up to 4K with Dolby Vision support), a new FHD webcam, dual noise-cancelling microphones and a user-facing Dolby Atmos Speaker System that is 20% larger than previous generation. And all of this weighs less than four pounds. Its [ more… ]

No Image

USN-5003-1: Linux kernel vulnerabilities

2021-06-23 KENNETH 0

USN-5003-1: Linux kernel vulnerabilities Norbert Slusarek discovered a race condition in the CAN BCM networking protocol of the Linux kernel leading to multiple use-after-free vulnerabilities. A local attacker could use this issue to execute arbitrary code. (CVE-2021-3609) It was discovered that the eBPF implementation in the Linux kernel did not properly track bounds information for 32 bit registers when performing div and mod operations. A local attacker could use this to possibly execute arbitrary code. (CVE-2021-3600) Or Cohen discovered that the SCTP implementation in the Linux kernel contained a race condition in some situations, leading to a use-after-free condition. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-23133) Source: USN-5003-1: Linux kernel vulnerabilities

No Image

USN-5002-1: Linux kernel (HWE) vulnerability

2021-06-23 KENNETH 0

USN-5002-1: Linux kernel (HWE) vulnerability Norbert Slusarek discovered a race condition in the CAN BCM networking protocol of the Linux kernel leading to multiple use-after-free vulnerabilities. A local attacker could use this issue to execute arbitrary code. Source: USN-5002-1: Linux kernel (HWE) vulnerability

No Image

USN-5001-1: Linux kernel (OEM) vulnerabilities

2021-06-23 KENNETH 0

USN-5001-1: Linux kernel (OEM) vulnerabilities Norbert Slusarek discovered a race condition in the CAN BCM networking protocol of the Linux kernel leading to multiple use-after-free vulnerabilities. A local attacker could use this issue to execute arbitrary code. (CVE-2021-3609) Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation did not properly clear received fragments from memory in some situations. A physically proximate attacker could possibly use this issue to inject packets or expose sensitive information. (CVE-2020-24586) Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation incorrectly handled encrypted fragments. A physically proximate attacker could possibly use this issue to decrypt fragments. (CVE-2020-24587) Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation incorrectly handled certain malformed frames. If a user were tricked into connecting to a malicious server, a physically proximate attacker could use this issue to inject packets. (CVE-2020-24588) Mathy Vanhoef [ more… ]

No Image

USN-5000-1: Linux kernel vulnerabilities

2021-06-23 KENNETH 0

USN-5000-1: Linux kernel vulnerabilities Norbert Slusarek discovered a race condition in the CAN BCM networking protocol of the Linux kernel leading to multiple use-after-free vulnerabilities. A local attacker could use this issue to execute arbitrary code. (CVE-2021-3609) Piotr Krysiuk discovered that the eBPF implementation in the Linux kernel did not properly enforce limits for pointer operations. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2021-33200) Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation did not properly clear received fragments from memory in some situations. A physically proximate attacker could possibly use this issue to inject packets or expose sensitive information. (CVE-2020-24586) Mathy Vanhoef discovered that the Linux kernel’s WiFi implementation incorrectly handled encrypted fragments. A physically proximate attacker could possibly use this issue to decrypt fragments. (CVE-2020-24587) Mathy [ more… ]